Quantcast
Channel: Cisco Blogs
Browsing all 41 articles
Browse latest View live

Three Key Considerations When Evaluating Threat Intelligence Solutions

To address today’s evolving threat landscape, there’s been a shift from traditional event-driven security to intelligence-led security. Threat intelligence plays an integral role in this shift. When...

View Article



AMP Threat Grid integrates with Tripwire Enterprise

Today’s threat landscape is completely different than last year; and next years will be, not surprisingly, even worse. The Industrialization of Hacking has spawned a new era of professional,...

View Article

AMP Threat Grid Integrated with Email Security

We recently announced the release of AsyncOS 9.5 for Cisco Email Security that included the integration of AMP Threat Grid. Now if Threat Grid could talk it would sound a lot like Ron Burgundy and say...

View Article

Creating an Intelligence-Led Security Organization

I recently had the opportunity to sit down with Roland Cloutier, Global Chief Security Officer at ADP and former CISO at EMC, to discuss how they integrate and leverage threat intelligence into their...

View Article

Security Beyond the Sandbox

A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became...

View Article


Pushing Security from Edge to Endpoint

On November 3rd, Cisco announced that we are extending our Security Everywhere strategy with new solutions and services aimed at helping our customers gain greater visibility, context, and control from...

View Article

Find Advanced Threats with Cisco Cognitive Threat Analytics

Attackers are constantly innovating, employing more sophisticated techniques to compromise organizations and gain access to other parts of the network and sensitive data including proprietary...

View Article

Detecting Ransomware From The Outside Looking In

Most malware analysis technologies, like sandboxes, put some sort of hook or software inside their analysis environment in order to observe what is actually happening. This could be a specific DLL...

View Article


When you need complete privacy: An on-premises private cloud

Do you dream of keeping your data under a lock and key that only you control? Or are you trying to appease regulations, whether corporate or government mandated? Organizations should not fear the...

View Article


Serenity Now! A better way to malware analysis.

Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for!  Sandboxing is a type of malware analysis – dynamic malware analysis to be...

View Article

The light is green! But is it safe to go? Abusing users’ faith in HTTPS

This post was authored by Anna Shirokova and Ivan Nikolaev John Smith had a lot of friends and liked to travel. One day he got an email that read: “Money has been sent to your PayPal account”. The...

View Article

Replace your AV with Next Generation Endpoint Security

If you’ve been to a security conference in the last year you’ve probably seen more than 20 different vendors all talking about endpoint security. Some might be talking about next generation anti-virus,...

View Article

Cisco Security Connector: Built for iOS 11

Apple and Cisco have partnered to help businesses in every industry accelerate their mobile transformation. From seamless user experience with collaborative applications to Wi-Fi optimization, the...

View Article


4 Key Questions To Determine If Your Endpoint Security Is Up To Snuff

Machine learning. Next-generation antivirus. Artificial intelligence. These are all terms you likely see in your inbox on a daily basis from various endpoint security vendors. Meanwhile, you’re trying...

View Article

How We Apply Machine Learning in Cisco Advanced Threat Solutions

There is a lot of talk lately about machine learning when it comes to cyber security. It seems like you can’t have a conversation about one without the other....

View Article


New Study Shows Correlating Network and Endpoint Data is Highly Manual

We recently commissioned Forrester research to survey IT security professionals to find out what their desired end state was when it came to correlating security intelligence from network and endpoint....

View Article

Image may be NSFW.
Clik here to view.

Full-stack application and data security with business risk observability

Cisco Full-Stack Observability brings application observability together with security intelligence and risk assessment for comprehensive business-focused oversight Businesses in all sectors and… Read...

View Article


Image may be NSFW.
Clik here to view.

Maximize Managed Services: Cisco ThousandEyes Drives MSPs Towards Outstanding...

IT related outages and performance issues can inflict significant financial and operational harm on businesses, especially in critical sectors such as finance, healthcare, and e-commerce. These IT…...

View Article

Image may be NSFW.
Clik here to view.

Calling All Past Alumni to Test their Strength and Compete

Join the competition of a lifetime on May 2, 2024. Where alumni who had the spark to train hard can compete on the grandest stage of all: the Cisco-Athlon. Hard work and the desire to push oneself…...

View Article

Image may be NSFW.
Clik here to view.

Cisco Gold Partner: A Team Approach to Certification Turns to Gold at...

Certifications are an excellent way to achieve self-improvement, greater technical knowledge, and higher career goals. They’ve always been personal and individual—until now.  Advanced Unibyte GmbH (AU…...

View Article
Browsing all 41 articles
Browse latest View live




Latest Images